Patents by Inventor Udit Dhawan
Udit Dhawan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11507373Abstract: Techniques are described for metadata processing that can be used to encode an arbitrary number of security policies for code running on a processor. Metadata may be added to every word in the system and a metadata processing unit may be used that works in parallel with data flow to enforce an arbitrary set of policies. In one aspect, the metadata may be characterized as unbounded and software programmable to be applicable to a wide range of metadata processing policies. Techniques and policies have a wide range of uses including, for example, safety, security, and synchronization. Additionally, described are aspects and techniques in connection with metadata processing in an embodiment based on the RISC-V architecture.Type: GrantFiled: December 12, 2016Date of Patent: November 22, 2022Assignees: THE CHARLES STARK DRAPER LABORATORY, INC., THE NATIONAL INSTITUTE FOR RESEARCH IN DATA PROCESSING AND AUTOMATION, THE TRUSTEES OF THE UNIVERSITY OF PENNSYLVANIAInventors: André Dehon, Catalin Hritcu, Udit Dhawan
-
Patent number: 11232208Abstract: Methods, systems, and computer readable media for using variable metadata tags. A method occurs at a metadata processing system for enforcing security policies in a processor architecture. The method comprises: receiving, at the metadata processing system, a tag associated with a word in memory, wherein the tag indicates a memory location containing metadata associated with the word and wherein the tag length is at least in part determined using tag usage frequency; obtaining the metadata from the memory location, and determining, using the metadata, whether the word or a related instruction violates a security policy.Type: GrantFiled: February 26, 2020Date of Patent: January 25, 2022Assignee: THE TRUSTEES OF THE UNIVERSITY OF PENNSYLVANIAInventors: Andre DeHon, Udit Dhawan, Nicholas Edward Roessler
-
Patent number: 10866902Abstract: Processor, apparatus, and method for reordering a stream of memory access requests to establish locality are described herein. One embodiment of a method includes: storing in a request queue memory access requests generated by a plurality of execution units, the memory access requests comprising a first request to access a first memory page in a memory and a second request to access a second memory page in the memory; maintaining a list of unique memory pages, each unique memory page associated with one or more memory access requests stored the request queue and is to be accessed by the one or more memory access requests; selecting a current memory page from the list of unique memory pages; and dispatching from the request queue to the memory, all memory access requests associated with the current memory page before any other memory access request in the request queue is dispatched.Type: GrantFiled: December 28, 2016Date of Patent: December 15, 2020Assignee: Intel CorporationInventors: Ishwar S. Bhati, Udit Dhawan, Jayesh Gaur, Sreenivas Subramoney
-
Publication number: 20200272736Abstract: Methods, systems, and computer readable media for using variable metadata tags. A method occurs at a metadata processing system for enforcing security policies in a processor architecture. The method comprises: receiving, at the metadata processing system, a tag associated with a word in memory, wherein the tag indicates a memory location containing metadata associated with the word and wherein the tag length is at least in part determined using tag usage frequency; obtaining the metadata from the memory location, and determining, using the metadata, whether the word or a related instruction violates a security policy.Type: ApplicationFiled: February 26, 2020Publication date: August 27, 2020Inventors: Andre DeHon, Udit Dhawan, Nicholas Edward Roessler
-
Patent number: 10725778Abstract: A method includes receiving, for metadata processing, a current instruction with a associated metadata tags. The metadata processing is performed in a metadata processing domain isolated from a code execution domain including the current instruction. Each respective associated metadata tag representing a respective policy of the composite policy. The associated metadata tags further including pointers to tags of a component policy of the composite policy. For each respective metadata tag, the method includes determining, in the metadata processing domain and in accordance with the metadata tag and the current instruction, whether a rule exists in a rule cache for the current instruction. The rule cache including rules on metadata used by said metadata processing to define allowed instructions. The determination of whether a rule exists resulting in a respective output.Type: GrantFiled: June 7, 2018Date of Patent: July 28, 2020Assignees: The Charles Stark Draper Laboratory, Inc., The Trustees of the University of Pennsylvania Penn Center for InnovationInventors: Andre′ DeHon, Udit Dhawan
-
Patent number: 10719630Abstract: A system and method for metadata processing that can be used to encode an arbitrary number of security policies for code running on a stored-program processor. This disclosure adds metadata to every word in the system and adds a metadata processing unit that works in parallel with data flow to enforce an arbitrary set of policies, such that metadata is unbounded and software programmable to be applicable to a wide range of metadata processing policies. This instant disclosure is applicable to a wide range of uses including safety, security, and synchronization.Type: GrantFiled: September 18, 2018Date of Patent: July 21, 2020Assignees: BAE Systems Information and Electronic Systems Integration Inc., The Trustees of the University of PennsylvaniaInventors: Silviu S Chiricescu, Andre DeHon, Udit Dhawan
-
Patent number: 10642616Abstract: Techniques are described for metadata processing that can be used to encode an arbitrary number of security policies for code running on a processor. Metadata may be added to every word in the system and a metadata processing unit may be used that works in parallel with data flow to enforce an arbitrary set of policies. In one aspect, the metadata may be characterized as unbounded and software programmable to be applicable to a wide range of metadata processing policies. Techniques and policies have a wide range of uses including, for example, safety, security, and synchronization. Additionally, described are aspects and techniques in connection with metadata processing in an embodiment based on the RISC-V architecture.Type: GrantFiled: June 16, 2017Date of Patent: May 5, 2020Assignees: The Charles Stark Draper Laboratory, Inc, The Trustees of the University of Pennsylvania Penn Center for InnovationInventors: Andre' DeHon, Udit Dhawan
-
Publication number: 20190384604Abstract: Techniques are described for metadata processing that can be used to encode an arbitrary number of security policies for code running on a processor. Metadata may be added to every word in the system and a metadata processing unit may be used that works in parallel with data flow to enforce an arbitrary set of policies. In one aspect, the metadata may be characterized as unbounded and software programmable to be applicable to a wide range of metadata processing policies. Techniques and policies have a wide range of uses including, for example, safety, security, and synchronization. Additionally, described are aspects and techniques in connection with metadata processing in an embodiment based on the RISC-V architecture.Type: ApplicationFiled: December 12, 2016Publication date: December 19, 2019Applicants: THE CHARLES STARK DRAPER LABORATORY, INC., The Trustees of the University of Pennsylvania, THE NATIONAL INSTITUTE FOR RESEARCH IN DATA PROCESSING AND AUTOMATION, The Trustees of the University of PennsylvaniaInventors: André Dehon, Catalin Hritcu, Udit Dhawan
-
Publication number: 20190034665Abstract: A system and method for metadata processing that can be used to encode an arbitrary number of security policies for code running on a stored-program processor. This disclosure adds metadata to every word in the system and adds a metadata processing unit that works in parallel with data flow to enforce an arbitrary set of policies, such that metadata is unbounded and software programmable to be applicable to a wide range of metadata processing policies. This instant disclosure is applicable to a wide range of uses including safety, security, and synchronization.Type: ApplicationFiled: September 18, 2018Publication date: January 31, 2019Inventors: Silviu S. Chiricescu, Andre DeHon, Udit Dhawan
-
Patent number: 10078763Abstract: A system and method for metadata processing that can be used to encode an arbitrary number of security policies for code running on a stored-program processor. This disclosure adds metadata to every word in the system and adds a metadata processing unit that works in parallel with data flow to enforce an arbitrary set of policies, such that metadata is unbounded and software programmable to be applicable to a wide range of metadata processing policies. This instant disclosure is applicable to a wide range of uses including safety, security, and synchronization.Type: GrantFiled: November 19, 2015Date of Patent: September 18, 2018Assignees: BAE Systems Information and Electronic Systems Integration Incc, The Trustees of the University of PennsylvaniaInventors: Silviu Chiricescu, Andre DeHon, Udit Dhawan
-
Publication number: 20180181329Abstract: Processor, apparatus, and method for reordering a stream of memory access requests to establish locality are described herein. One embodiment of a method includes: storing in a request queue memory access requests generated by a plurality of execution units, the memory access requests comprising a first request to access a first memory page in a memory and a second request to access a second memory page in the memory; maintaining a list of unique memory pages, each unique memory page associated with one or more memory access requests stored the request queue and is to be accessed by the one or more memory access requests; selecting a current memory page from the list of unique memory pages; and dispatching from the request queue to the memory, all memory access requests associated with the current memory page before any other memory access request in the request queue is dispatched.Type: ApplicationFiled: December 28, 2016Publication date: June 28, 2018Inventors: Ishwar S. Bhati, Udit Dhawan, Jayesh Gaur, Sreenivas Subramoney
-
Publication number: 20170293563Abstract: Techniques are described for metadata processing that can be used to encode an arbitrary number of security policies for code running on a processor. Metadata may be added to every word in the system and a metadata processing unit may be used that works in parallel with data flow to enforce an arbitrary set of policies. In one aspect, the metadata may be characterized as unbounded and software programmable to be applicable to a wide range of metadata processing policies. Techniques and policies have a wide range of uses including, for example, safety, security, and synchronization. Additionally, described are aspects and techniques in connection with metadata processing in an embodiment based on the RISC-V architecture.Type: ApplicationFiled: June 16, 2017Publication date: October 12, 2017Inventors: Andre' DeHon, Udit Dhawan
-
Publication number: 20160140363Abstract: A system and method for metadata processing that can be used to encode an arbitrary number of security policies for code running on a stored-program processor. This disclosure adds metadata to every word in the system and adds a metadata processing unit that works in parallel with data flow to enforce an arbitrary set of policies, such that metadata is unbounded and software programmable to be applicable to a wide range of metadata processing policies. This instant disclosure is applicable to a wide range of uses including safety, security, and synchronization.Type: ApplicationFiled: November 19, 2015Publication date: May 19, 2016Inventors: Silviu Chiricescu, Andre DeHon, Udit Dhawan